Lucene search

K
cveLinuxCVE-2024-41011
HistoryJul 18, 2024 - 7:15 a.m.

CVE-2024-41011

2024-07-1807:15:02
CWE-682
Linux
web.nvd.nist.gov
16
linux kernel
mmio
hdp page
large pages
vulnerability

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.5

Confidence

Low

EPSS

0

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: don’t allow mapping the MMIO HDP page with large pages

We don’t get the right offset in that case. The GPU has
an unused 4K area of the register BAR space into which you can
remap registers. We remap the HDP flush registers into this
space to allow userspace (CPU or GPU) to flush the HDP when it
updates VRAM. However, on systems with >4K pages, we end up
exposing PAGE_SIZE of MMIO space.

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelRange5.35.4.283
OR
linuxlinux_kernelRange5.55.10.225
OR
linuxlinux_kernelRange5.115.15.166
OR
linuxlinux_kernelRange5.166.1.91
OR
linuxlinux_kernelRange6.76.8.10
OR
linuxlinux_kernelMatch6.9rc1
OR
linuxlinux_kernelMatch6.9rc2
OR
linuxlinux_kernelMatch6.9rc3
OR
linuxlinux_kernelMatch6.9rc4
OR
linuxlinux_kernelMatch6.9rc5
OR
linuxlinux_kernelMatch6.9rc6
OR
linuxlinux_kernelMatch6.9rc7
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linuxlinux_kernel6.9cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*
linuxlinux_kernel6.9cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*
linuxlinux_kernel6.9cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*
linuxlinux_kernel6.9cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*
linuxlinux_kernel6.9cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*
linuxlinux_kernel6.9cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:*
linuxlinux_kernel6.9cpe:2.3:o:linux:linux_kernel:6.9:rc7:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/gpu/drm/amd/amdkfd/kfd_chardev.c"
    ],
    "versions": [
      {
        "version": "d8e408a82704",
        "lessThan": "009c4d78bcf0",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "d8e408a82704",
        "lessThan": "f7276cdc1912",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "d8e408a82704",
        "lessThan": "8ad4838040e5",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "d8e408a82704",
        "lessThan": "89fffbdf535c",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "d8e408a82704",
        "lessThan": "4b4cff994a27",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "d8e408a82704",
        "lessThan": "6186c9356088",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "d8e408a82704",
        "lessThan": "be4a2a81b6b9",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "drivers/gpu/drm/amd/amdkfd/kfd_chardev.c"
    ],
    "versions": [
      {
        "version": "5.3",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "5.3",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.4.283",
        "lessThanOrEqual": "5.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.10.225",
        "lessThanOrEqual": "5.10.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.15.166",
        "lessThanOrEqual": "5.15.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.1.91",
        "lessThanOrEqual": "6.1.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.6.31",
        "lessThanOrEqual": "6.6.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.8.10",
        "lessThanOrEqual": "6.8.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "6.9",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.5

Confidence

Low

EPSS

0

Percentile

5.1%